Bug 1699141 (CVE-2019-9494)
Summary: | CVE-2019-9494 wpa_supplicant: SAE Timing-based and Cache-based side-channel attack against WPA3's Dragonfly handshake | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Laura Pardo <lpardo> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED NOTABUG | QA Contact: | |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | unspecified | CC: | bgalvani, blueowl, bmcclain, dblechte, dcaratti, dcbw, dfediuck, eedri, john.j5live, linville, lkundrak, mgoldboi, michal.skrivanek, negativo17, sbonazzo, sherold, sukulkar, yturgema |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2019-05-22 13:49:55 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1699143, 1699144, 1699145 | ||
Bug Blocks: | 1687612 |
Description
Laura Pardo
2019-04-11 21:47:56 UTC
Created hostapd tracking bugs for this issue: Affects: epel-all [bug 1699145] Affects: fedora-all [bug 1699144] Created wpa_supplicant tracking bugs for this issue: Affects: fedora-all [bug 1699143] Setting Attack Complexity (AC) to High because an attacker needs the password to be weak for the dictionary attack to succeed, which is not under the attacker control. An attacker who is able to recover the password of a network could use it to impact the Confidentiality, Integrity and Availability of the transmission (CIA:H). Statement: This issue did not affect the versions of wpa_supplicant as shipped with Red Hat Enterprise Linux 5, 6 as they did not include support for SAE (Simultaneous Authentication of Equals). This issue did not affect the versions of wpa_supplicant as shipped with Red Hat Enterprise Linux 7 as they are not compiled with SAE (Simultaneous Authentication of Equals) enabled. In particular, the CONFIG_SAE=y option is not set at compile time. Acknowledgments: Name: Mathy Vanhoef (NYUAD), Eyal Ronen (Tel Aviv University & KU Leuven) External References: https://w1.fi/security/2019-1/sae-side-channel-attacks.txt https://www.kb.cert.org/vuls/id/871675/ hostapd-2.7-2.fc28 has been pushed to the Fedora 28 stable repository. If problems still persist, please make note of it in this bug report. hostapd-2.7-2.fc29 has been pushed to the Fedora 29 stable repository. If problems still persist, please make note of it in this bug report. |